CIS 204 exam 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

The radio communication standard used in modern wireless LANs is

802.11

The image below illustrates a feature associated with cloud computing. The variables (the x axis and the y axis of the chart) are "Demand" and "Time." Which feature does it illustrate?

Elasticity

"Internet" and "Web" can be used interchangeably.

False

Which of the following types of transmission wires have the greatest bandwidth?

Fiber optic

_____ is a satellite-based tracking system that enables users to determine a person's position.

Global positioning system

The small geographical perimeter within which a wireless router provides service is called a ________.

Hotspot

When a device connects to a network, it is automatically assigned a(n) _____.

IP address

From left to right, what are the three types of services included in the columns with the hidden headings?

IaaS, PaaS, SaaS

Data is routed through "hubs;" as illustrated in the image below, these "hubs" or ____________ are located around the United States (and around the world).

Internet exchange points or servers

A(n) _____ connects two or more devices in a limited geographical area in which multiple devices could be connected over several hundred feet and for multiple users.

LAN

Gal runs a music store. He has a desktop computer in the back room that acts as a server. He has a point-of-sale terminal that connects to the desktop. He also has a notebook (using in-store wireless access to the Internet) that can be carried around the store to look up current items in stock, or to search for items from one of his suppliers for special orders. Which type of network does Gal have?

LAN

When you login to Canvas, your request is sent back to JMU for confirmation that you are a member of the JMU community and have permission to access Canvas. JMU checks a database to make sure your credentials are present. It also sends you a message through Duo so you can confirm that you actually made the request. This process is called ______________.

authentication

The online article, "What if the cloud took a hit?" includes the following quote: "Clouds can fail or be brought down in many ways -- ranging from malicious attacks by terrorists to lighting strikes, flooding or simply a mundane error by an employee." The author of the article states that we "need to plan for these eventualities" by ______________.

creating a disaster recovery plan

What is measured in "bits" and written as Kbps, Mbps, etc.?

bandwidth

Keyboards and other "close-proximity" devices use the ________________ standard.

bluetooth

Alisha's startup has another record month. She posts pictures of her best selling handbag to Facebook and Instagram. Her friends and customers leave her positive comments. Alisha's post and her friends' comments are an example of ________.

content data

According to your textbook, which of the following is NOT considered a benefit of cloud computing?

control of data location

Social ________ provide platforms that enable the creation of social networks, or social relationships among people with common interests.

media providers

A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly.

network

When I connected my laptop to JMU's network using a wireless access point on campus, my laptop had a different IP address than when I had connected it to my home wireless system. Does this mean my MAC address also changed?

no

Which of the following terms is NOT typically associated with cloud computing?

on-prem

________________ is a transmission technology that breaks up blocks of text/data into packets.

packet switching

Stan loves collecting stamps. He receives an email that appears to come from a well-known stamp auction site asking him to reset his username and password. He clicks on the link and it takes him to a site that looks similar to the auction site, but the Web address is "scrambled" and unreadable. He emails the customer service desk at the auction site and discovers they never sent the email. This scenario is an example of attempted ________.

phishing

uses deception to acquire sensitive information

phising

You start a new job, and the first thing your new company wants you to do is create a user ID and a password. To remember your password, you write it on a Post It note and put it on your laptop screen. This is an example of ________________.

poor security

You are an employee of a large pharmaceutical firm that has thousands of drug patents. Your job is to review those patents. To reduce costs, the company has moved to a cloud environment for storage of their patent and other business records. When you access their patent records,you are probably using a ____________ cloud.

private

Which of the following statements is true about IEEE 802.3?

protocol for wired LAN connections

If you subscribe to Adobe.com's SaaS service to have access to Photoshop and other Creative Suite tools, you would be using a _________ cloud.

public

What are the 3 types of cloud environments mentioned in the videos? NOTE: this refers to types of clouds, not types of cloud services.

public, private, hybrid

Mobile cell phones use ________________ signals to connect to cell towers.

radio

The article, "What if the cloud took a hit?" describes the main points of the World Economic Forum (WEF) Global Risks Report 2018. This report indicates that extreme weather and natural disasters, cyberattacks, and cyber warfare are the "the most costly disasters in the world." What type of cyberattack does the report highlight in particular?

ransomware

In the context of IS Security, the _____________ is the defense or protective measure.

safegaurd

IS Security is a trade-off between ___________ and ____________.

security, freedom

________ is the investment in social relations with the expectation of returns in the marketplace.

social capital

targets large groups of people

spear phising

can record your keystrokes or capture passwords

spyware

A ________ is a special-purpose computer that receives and transmits wired traffic on the LAN.

switch

The circled item labeled "A" on the left side is a(n) _________. The circled item labeled "B" on the right side is a(n) _________. Exam_1_A_B.jpg

switch, router

In the context of IS Security, the ___________ is what a criminal wants.

target

Which of the following usually happens in a malicious denial-of-service attack (illustrated in the image below)?

A hacker floods a Web server with many millions of bogus service requests.

A protocol is ____________.

A standard set of rules and procedures for the control of communications in a network.

Use the following image to match the letters on the left with the address component on the right

A=IP address B=URL c=Net ID D=subnet E=domain name F= Domain

In order for computers to route a request such as "www.amazon.com," the _________ must translate the words into numbers.

DNS server

UTP cable connects to the computer through the _________________.

NIC

________ present(s) the largest risk for an organization's infrastructure loss.

Natural disaters

If you're using your Bluetooth headset with your phone, you are using a __________.

PAN

Referring to the image below, which type of cloud service would likely handle all aspects of an application - the software, the resources to run it, and storing the data?

Saas

A ________ is an information system that supports the sharing of content among networks of users.

SMIS

Which of the following categories of cloud services is similar to "taking a taxi" instead of buying or renting a car?

SaaS

"HTTP" indicates the protocol for the WWW.

True

A WAN often uses the internet to transmit data from one location to another.

True

If you were asked to install wire to connect computers, printers, switches and other devices in a LAN, you would probably use ________________.

UTP

The term "tunnel" is most closely associated with which of the following?

VPN

Computers that reside in different geographic locations but are in the same network are physically connected through a(n) ________.

WAN

In order for my laptop to connect to the wireless network, it must have a(n) _____________

WNIC

In the image below, what is the antenna in the circled area called? data_communication_SOHO_sm.jpg

Wireless access point

According to JMU's web page, Safeguard Your Identity and Password, which of the following is the most frequent way that passwords are compromised?

You give them to criminals who fooled you with a "phishing" message or fake web site.

You send an email to a friend across the country. The message leaves your house, goes to your ISP, goes out to the internet and heads towards a "hub" in Northern Virginia. However, that hub is down. What will likely happen?

Your email is redirected to another hum

Jalo was browsing an online shopping site when a program got downloaded onto her system without her knowledge. The next day she found that her search engine had been changed, and she received pop-up advertisements of the shopping site she had visited the previous day. The program on Jalo's system is ________.

adware

software that automatically pisplays or downloads advertising material

adware

Which of the following is considered a threat caused by human error

an employee inadvertently installing an old database on top of the current one

Verizon and other wireless phone service providers break a geographical area (such as a city) into __________, which allow the company to reuse frequencies multiple times throughout that geographical area.

cells

stiff, high bandwidth capacity, insulated copper

coaxial cable

The storage of ________ differentiates social media information systems (SMIS) from Web site applications.

connection data

In the address, "www.jmu.edu," the "edu" is called a(n) ____________.

domain

Flexible, cheap, can carry signals for 200-300 feet, susceptible to interference

ethernet cable

Only private clouds offer IaaS services.

false

Internet companies probably use ______________ to connect WANS.

fiber optic cable

glass and cladding, very high bandwidth capacity, more secure from interference

fiber optic cable

Exam2_Image2.jpg The ISP in the diagram is often referred to as the __________

gateway to the internet

uses comp to gain unautorized info

hack

Griffin has been working really hard lately and asks his manager for a raise. His manager tells him that he is already the highest paid employee on the floor. Griffin doesn't believe his manager, and illegally accesses the employee database to look at salary data. Griffin's act can be termed as ________.

hacking

A small geographical perimeter within which a wireless access point provides service to a number of users is called a ________.

hotspot

Layla is purchasing a new laptop from an online vendor. Which of the following will be displayed in the address bar of the vendor's browser that will let Layla know that the online retailer is using the Secure Sockets Layer (SSL) protocol?

https

HTTP stands for ....

hyper text transfer protocol

If the MAC address changed in my computer, what would have happened?

i replaced the NIC

The overall purpose of the table above is to (TCP/IP layered protocol scheme)

identify the protocols and standards for different aspects of connectivity between computers (from physical to the Web).

According to Nan Lin, social networks provide four forms of value: information, social credentials, personal reinforcement, and ________.

influence

The most common wireless technology for TV and DVD remote control devices is _______.

infrared

NIC stands for network ______________ card.`

interface

Which of the following statements is true about IEEE 802.3?

it is protocol for wired LAN connections

A ________ is a string of bits used to encrypt data.

key

A _____ is any danger to which an information resource may be exposed.

threat

What is the purpose of a NIC?

to enable access to the network

software that hides in other computer programs

trojan horse

Connection data is data about relationships.

true

Mobile devices such as your phone use the 3G or 4G wireless communication standards.

true

When you send an email to someone in another network, your email content is broken up into pieces, each of which might take a different path to reach the destination.

true

If your request for a web page (for example, when you type in www.amazon.com) goes to a hub that is down, your request will find another hub that will help it reach its destination.

truw

Which of the following types of wire is also referred to as "ethernet cable"?

twisted pair (inshieleded twisted pair)

The ________ tier of the three-tier architecture consists of computers, phones, and other mobile devices that have browsers that request and process Web pages.

user

Which of the following refers to the three tiers in the three-tier architecture?

user,server,database

________, which refers to the matter on a social media (SM) site that is contributed by users, is the essence of SM relationships.

user-generated content

A(n) ________ is an inducement to social media users for passing communications along through different tiers of communities in social media.

viral hook

Segment of computer code that performs malicious actions by attaching to another computer program.

virus

An information system's _____ is the possibility that the system will be harmed by a threat.

vulnerablity

________ are programs that run on a server-tier computer and manage traffic by sending and receiving Web pages to and from clients.

web servers

The IEEE standard for __________ networking is 802.11

wireless

segment of computer codes that performs malicious actions and will replicate or spread by itself

worm


Conjuntos de estudio relacionados

Chapter 13, 14, 15, 16, 19, 20, 21, 22, 23, 24 Practice Questions

View Set

Food Science Exam Question Bank (2012-2021)

View Set